[{"data":1,"prerenderedAt":430},["ShallowReactive",2],{"navigation_docs_fr":3,"dtpr-schemas-index":14,"dtpr-element-detail-input_generated_content":22,"dtpr-element-detail-categories":66,"dtpr-element-overlay-input_generated_content":133},[4,8],{"title":5,"path":6,"stem":7},"Citer DTPR for AI","/fr/cite","fr/11.cite",{"title":9,"path":10,"stem":11,"children":12},"Outils","/fr/tools","fr/8.tools/0.index",[13],{"title":9,"path":10,"stem":11},{"ok":15,"versions":16},true,[17],{"id":18,"status":19,"created_at":20,"content_hash":21},"ai@2026-05-06-beta","beta","2026-05-06T20:23:42.963Z","sha256-2d208111b0c597ff2b38cb1c24168799b0a5ff9290203ebf46c4f7c16a0fcb24",{"ok":15,"version":18,"element":23},{"id":24,"category_id":25,"title":26,"description":30,"authoring_guidance":33,"examples":34,"sources":35,"symbol_id":49,"variables":50,"shape":56,"icon_variants":57},"input_generated_content","input_dataset",[27],{"locale":28,"value":29},"en","Generated content",[31],{"locale":28,"value":32},"Text, images, audio, or video that another AI made. The AI takes in this synthetic content and processes it further. Examples: an LLM-written summary fed into a translator, a generated photo passed to a moderation model, a text-to-speech clip routed to an audio system.",[],[],[36,41,44],{"type":37,"title":38,"url":39,"citation":40},"regulation","EU AI Act Article 3(1) — output class \"content\"","https://eur-lex.europa.eu/eli/reg/2024/1689/oj","Regulation (EU) 2024/1689, Article 3(1).",{"type":37,"title":42,"url":39,"citation":43},"EU AI Act Article 50 — Synthetic-content disclosure","Regulation (EU) 2024/1689, Article 50.",{"type":45,"title":46,"url":47,"citation":48},"standard","NIST AI 100-4 — AI Risk Management Framework","https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-4.pdf","NIST.","generated_content",[51],{"id":52,"label":53,"required":15},"additional_description",[54],{"locale":28,"value":55},"Description","circle",[58,59,60,61,62,63,64,65],"default","dark","de_identified","de_identified.dark","pseudonymous","pseudonymous.dark","identifiable","identifiable.dark",{"ok":15,"version":18,"categories":67},[68,90,142,204,255,299,318,337,361,382,408],{"id":69,"name":70,"description":73,"prompt":76,"authoring_guidance":79,"examples":80,"sources":81,"required":82,"order":83,"datachain_type":84,"shape":85,"element_variables":86},"access",[71],{"locale":28,"value":72},"Access",[74],{"locale":28,"value":75},"Who can see or use the data produced by this AI system.",[77],{"locale":28,"value":78},"Who has access to the data?",[],[],[],false,9,"ai","rounded-square",[87],{"id":52,"label":88,"required":82},[89],{"locale":28,"value":55},{"id":91,"name":92,"description":95,"prompt":98,"authoring_guidance":101,"examples":102,"sources":103,"required":15,"order":104,"datachain_type":84,"shape":105,"element_variables":106,"element_context":116},"accountable",[93],{"locale":28,"value":94},"Accountable",[96],{"locale":28,"value":97},"The organization responsible for deploying and operating this AI system.",[99],{"locale":28,"value":100},"Who is accountable for this AI system?",[],[],[],2,"hexagon",[107,112],{"id":108,"label":109,"required":15},"title",[110],{"locale":28,"value":111},"Title",{"id":113,"label":114,"required":15},"description",[115],{"locale":28,"value":55},{"id":117,"name":118,"description":121,"values":124},"role",[119],{"locale":28,"value":120},"Role",[122],{"locale":28,"value":123},"How this organization participates in the deployment of the AI system.",[125,134],{"id":126,"name":127,"description":130,"color":133},"vendor",[128],{"locale":28,"value":129},"Vendor",[131],{"locale":28,"value":132},"The organization that builds, supplies, or licenses the AI system.",null,{"id":135,"name":136,"description":139,"color":133},"deployer",[137],{"locale":28,"value":138},"Deployer",[140],{"locale":28,"value":141},"The organization that deploys and operates the AI system in this place.",{"id":143,"name":144,"description":147,"prompt":150,"authoring_guidance":153,"examples":156,"sources":157,"required":15,"order":163,"datachain_type":84,"shape":105,"element_variables":164,"element_context":168},"functional_modes",[145],{"locale":28,"value":146},"Functional Modes",[148],{"locale":28,"value":149},"How this AI system operates — the functional modes (e.g. analytical, semantic, generative, agentic, perceptive, physical) it composes.",[151],{"locale":28,"value":152},"What is the AI system doing?",[154],{"locale":28,"value":155},"Pick one or more functional modes.",[],[158],{"type":159,"title":160,"url":161,"citation":162},"framework","AI Taxonomy — An Operational Framework for Precision in AI Discourse","https://dropleaf.app/d/AlXez8scbd","Narain Jashanmal, v1.1, January 2026.",3,[165],{"id":52,"label":166,"required":82},[167],{"locale":28,"value":55},{"id":169,"name":170,"description":173,"values":176},"autonomy",[171],{"locale":28,"value":172},"Autonomy",[174],{"locale":28,"value":175},"How much this mode decides and acts on its own. The element name says what the mode does; this label says who chooses and who carries out the result.",[177,186,195],{"id":178,"name":179,"description":182,"color":185},"human_decides",[180],{"locale":28,"value":181},"Human decides",[183],{"locale":28,"value":184},"This mode suggests; a person decides what to do next. The AI is always advisory — a human is in the loop on every decision. Example: a triage tool ranks cases for a clinician who chooses which to see first.","#2A9D8F",{"id":187,"name":188,"description":191,"color":194},"human_executes",[189],{"locale":28,"value":190},"Human executes",[192],{"locale":28,"value":193},"This mode decides; a person carries out the result. Example: an optimizer plans the day’s trash-collection routes, and drivers run them.","#6A1B7A",{"id":196,"name":197,"description":200,"color":203},"autonomous",[198],{"locale":28,"value":199},"Autonomous",[201],{"locale":28,"value":202},"This mode decides and acts on its own. No person reviews each decision or carries out the resulting action.","#E76F51",{"id":25,"name":205,"description":208,"prompt":211,"authoring_guidance":214,"examples":215,"sources":216,"required":82,"order":217,"datachain_type":84,"shape":56,"element_variables":218,"element_context":222},[206],{"locale":28,"value":207},"Input Dataset",[209],{"locale":28,"value":210},"The input data this deployed system processes when it operates. Distinct from training data.",[212],{"locale":28,"value":213},"What input data does this AI system process?",[],[],[],6,[219],{"id":52,"label":220,"required":15},[221],{"locale":28,"value":55},{"id":223,"name":224,"description":227,"values":230},"pii",[225],{"locale":28,"value":226},"Personal Information",[228],{"locale":28,"value":229},"How identifiable the data is when this system processes it. The element name says what the data is about; this colour says how directly it identifies a person.",[231,239,247],{"id":60,"name":232,"description":235,"color":238},[233],{"locale":28,"value":234},"Anonymized data",[236],{"locale":28,"value":237},"Data about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so this system can’t reasonably tie a record back to an individual.","#4A90D9",{"id":62,"name":240,"description":243,"color":246},[241],{"locale":28,"value":242},"Pseudonymous data",[244],{"locale":28,"value":245},"Each person’s data is tied to a token (hash, ID, template) that lets this system recognise the same person across events, but the token itself doesn’t reveal a name. Reidentification is possible with extra information.","#9575CD",{"id":64,"name":248,"description":251,"color":254},[249],{"locale":28,"value":250},"Identifiable data",[252],{"locale":28,"value":253},"The data either contains a direct identifier (name, address, account name, recognisable face or voice, plate number) or carries a token this system uses to look up legal identity during processing.","#FFD700",{"id":256,"name":257,"description":260,"prompt":263,"authoring_guidance":266,"examples":267,"sources":268,"required":82,"order":269,"datachain_type":84,"shape":56,"element_variables":270,"element_context":274},"output_dataset",[258],{"locale":28,"value":259},"Output Dataset",[261],{"locale":28,"value":262},"The output data this deployed system produces when it operates — decisions, content, and actions.",[264],{"locale":28,"value":265},"What does this AI system produce?",[],[],[],8,[271],{"id":52,"label":272,"required":15},[273],{"locale":28,"value":55},{"id":223,"name":275,"description":277,"values":280},[276],{"locale":28,"value":226},[278],{"locale":28,"value":279},"How identifiable the data is when this system produces it. The element name says what the output is about; this colour says how directly it identifies a person.",[281,287,293],{"id":60,"name":282,"description":284,"color":238},[283],{"locale":28,"value":234},[285],{"locale":28,"value":286},"Output about people with the link to who is broken. Stripped of identifiers, blurred, aggregated, or noised so the result can’t reasonably be tied back to an individual.",{"id":62,"name":288,"description":290,"color":246},[289],{"locale":28,"value":242},[291],{"locale":28,"value":292},"The output is labelled with a token (hash, ID, template) that lets this system tie the result to the same person across events without revealing a name. Reidentification is possible with extra information.",{"id":64,"name":294,"description":296,"color":254},[295],{"locale":28,"value":250},[297],{"locale":28,"value":298},"The output names a person directly (name, address, account, recognisable face or voice, plate) or carries a token this system resolves to legal identity in the same step.",{"id":300,"name":301,"description":304,"prompt":307,"authoring_guidance":310,"examples":311,"sources":312,"required":82,"order":313,"datachain_type":84,"shape":56,"element_variables":314},"processing",[302],{"locale":28,"value":303},"Algorithm or Model",[305],{"locale":28,"value":306},"What processes the input — the algorithm family, model class, or technique used to turn inputs into outputs.",[308],{"locale":28,"value":309},"What algorithm or model processes the data?",[],[],[],7,[315],{"id":52,"label":316,"required":82},[317],{"locale":28,"value":55},{"id":319,"name":320,"description":323,"prompt":326,"authoring_guidance":329,"examples":330,"sources":331,"required":15,"order":332,"datachain_type":84,"shape":105,"element_variables":333},"purpose",[321],{"locale":28,"value":322},"Purpose",[324],{"locale":28,"value":325},"Why this AI system exists — the outcome it’s designed to achieve.",[327],{"locale":28,"value":328},"What is the purpose of this AI system?",[],[],[],1,[334],{"id":52,"label":335,"required":82},[336],{"locale":28,"value":55},{"id":338,"name":339,"description":342,"prompt":345,"authoring_guidance":348,"examples":349,"sources":350,"required":82,"order":351,"datachain_type":84,"shape":85,"element_variables":352},"retention",[340],{"locale":28,"value":341},"Retention",[343],{"locale":28,"value":344},"How long the data produced by this AI system is kept.",[346],{"locale":28,"value":347},"How long is the data kept?",[],[],[],10,[353,356],{"id":52,"label":354,"required":82},[355],{"locale":28,"value":55},{"id":357,"label":358,"required":15},"duration",[359],{"locale":28,"value":360},"Duration",{"id":362,"name":363,"description":366,"prompt":369,"authoring_guidance":372,"examples":373,"sources":374,"required":82,"order":375,"datachain_type":84,"shape":376,"element_variables":377},"rights",[364],{"locale":28,"value":365},"Rights",[367],{"locale":28,"value":368},"What you can do in relation to this AI system — how to access, contest, or opt out.",[370],{"locale":28,"value":371},"What are your rights?",[],[],[],5,"octagon",[378],{"id":362,"label":379,"required":15},[380],{"locale":28,"value":381},"Description of Rights",{"id":383,"name":384,"description":387,"prompt":390,"authoring_guidance":393,"examples":394,"sources":395,"required":82,"order":401,"datachain_type":84,"shape":376,"element_variables":402},"risks_mitigation",[385],{"locale":28,"value":386},"Risks & Mitigation",[388],{"locale":28,"value":389},"The risks this AI system could create and how they’re being addressed.",[391],{"locale":28,"value":392},"What are the risks and how are they mitigated?",[],[],[396],{"type":397,"title":398,"url":399,"citation":400},"research_paper","A Collaborative, Human-Centred Taxonomy of AI, Algorithmic, and Automation Harms","https://arxiv.org/abs/2407.01294","Abercrombie et al. (2024). arXiv:2407.01294. CC BY-SA 4.0.",4,[403],{"id":404,"label":405,"required":15},"mitigation",[406],{"locale":28,"value":407},"Description of Risks & Mitigations",{"id":409,"name":410,"description":413,"prompt":416,"authoring_guidance":419,"examples":420,"sources":421,"required":82,"order":422,"datachain_type":84,"shape":85,"element_variables":423},"storage",[411],{"locale":28,"value":412},"Data Storage",[414],{"locale":28,"value":415},"Where the data produced by this AI system is kept.",[417],{"locale":28,"value":418},"Where is the data stored?",[],[],[],11,[424,427],{"id":52,"label":425,"required":82},[426],{"locale":28,"value":55},{"id":357,"label":428,"required":15},[429],{"locale":28,"value":360},1779049712393]